Copyright by Jim Panyavorachart
Looking for a real bargain on laptop batteries? How do I know the batteries are running good as advertised? Which merchants are offering quality rechargeable cells? Where can I get the bargain? Where to buy?
Many of you have some of these questions? Certainly!!. We surely want to save our hard to earn $$ and only buy quality cells.
Here are the simple 3 steps to to locate the real bargain
1. Shop online Why?
Most of suppliers/distributors are now targetting retail consumers themselves. The online store overheads are much less than retail stores. No store leasing, No utitlity bills and much less employee payrolls. With all these, they can pass the big savings to customers. Importantly, they have the same guarantee and warranty as retail stores..plus...it's convenient!!! Quailty merchants offer FREE shipping!!
2. Find the saving coupons
This is the beauty!!...."saving coupons"....Online marketting is highly competitive. There are millions of stores out there. Merchants want to get noticed, they want sales...they issue saving coupons for marketting.......buying your laptop batteries using "online saving coupons" is double savings.
how to find?...here we go....
go to your favorite search engines "laptop battery coupon" as an example. you will find many coupons from many merchants.....now what...which one to buy?? ....lets move to the next step.
3. Find the quality merchants (ONLY)
Now we found many merchants selling online and offering saving coupons. Lets buy...?? Nope...not yet.....please make no mistake - buy from the cheapest possible stores is NOT a real bargain. We also want quality. Laptop batteries need to meet or exceed the original battery specification. Merchants need to own the following qualities...
- Free shipping - Free handling - Free customer support - Well established in battery industry - 30 days return policy - Full manufacturer warranty - Guarantee to meet or exceed the original specification - 100% fully compatible with your laptops - Online FAQs for yor battery inquiries - Optional express shipping How do we know?.....Let brainstorm!!!!...Let hear from others!!!....Review customer comments....Most quality merchants are listing their customer testimonials, customer ratings from 3rd party rating system such as BizRate, epinion,Pricegrabber or Dealtime.
You can normally locate the Bizrate reviews at the merchants' homepages. Simply click on the links they provide to review previous customers' comments.
Simply follow these 3 easy steps, you will find the real bargain comparing to local retail stores. Have a pleasant online shopping experience!!
Find all of your batteries and mobile accessories at batteries.com!!
For more on computer batteries
About the Author
jim is a veteran in battery industries. He publishes tips, knowledge and information on cusomter reviews and merchant raintgs @ http://www.laptop-battery-resource.com Join the newsletter - subscribe today http://www.laptop-battery-resource.com/laptop-battery-newsletter.html
Monday, October 31, 2005
Thursday, October 27, 2005
Buying a Hard-drive
How Much Space Do You Need - How Much Space Do You Have On Your Current Computer?
For novice buyers of computers or of a separate hard drive, it’s often hard to tell exactly how big you should go. Many people don’t even have a good idea of what a "gigabyte" is or how much space there files will take up. How exactly do you figure out how much storage space you’ll need?
If you already have a computer, this is actually an extremely easy thing to figure out. Right-click on your C: drive under the My Computer option, and select "Properties." This will bring up a little pie chart that tells you how much space you have and how much you are using. It will tell you in "gigabytes" or "GB", a unit of storage space.
Once you’ve found out how much you’re currently using, you should make sure that you get a hard drive that has at least a little more – you’ll want at least 20-25% more than what you’re currently using, just to allow yourself room to grow. If you’re on the low end (under 20 gigabytes), you should get even more, mainly because newer programs will take up more and more space.
What if you don’t already have computer space to measure? It depends on what you’re doing with it. If you’re just using your computer for basic business functions (e-mail, typing, etc.) then you only need 20-40 gigabytes. If you’re using it for games, you’ll want as much as you can get. If you have more advanced business functions (such as graphic design), then go for at least 100 gigabytes or so. The most important thing is that you don’t want to run out – if you do, you’ll have to delete something or buy a whole new drive.
For more Computer Tips - A1-Computers
Teve Torbes has interesting opinions on the subject of air purifier things, and he has produced a forklifts web site.
Article Source: http://EzineArticles.com/
For novice buyers of computers or of a separate hard drive, it’s often hard to tell exactly how big you should go. Many people don’t even have a good idea of what a "gigabyte" is or how much space there files will take up. How exactly do you figure out how much storage space you’ll need?
If you already have a computer, this is actually an extremely easy thing to figure out. Right-click on your C: drive under the My Computer option, and select "Properties." This will bring up a little pie chart that tells you how much space you have and how much you are using. It will tell you in "gigabytes" or "GB", a unit of storage space.
Once you’ve found out how much you’re currently using, you should make sure that you get a hard drive that has at least a little more – you’ll want at least 20-25% more than what you’re currently using, just to allow yourself room to grow. If you’re on the low end (under 20 gigabytes), you should get even more, mainly because newer programs will take up more and more space.
What if you don’t already have computer space to measure? It depends on what you’re doing with it. If you’re just using your computer for basic business functions (e-mail, typing, etc.) then you only need 20-40 gigabytes. If you’re using it for games, you’ll want as much as you can get. If you have more advanced business functions (such as graphic design), then go for at least 100 gigabytes or so. The most important thing is that you don’t want to run out – if you do, you’ll have to delete something or buy a whole new drive.
For more Computer Tips - A1-Computers
Teve Torbes has interesting opinions on the subject of air purifier things, and he has produced a forklifts web site.
Article Source: http://EzineArticles.com/
Tuesday, October 25, 2005
Getting The Most Out Of A Tablet PC
Tablet PCs are very cool and very portable. Do you need one? Do you want one? Read on to see if these PCs are for you. A1-Computers--
Stay Organized - Top PDAs and Handhelds
by Eve Larson
What is a tablet PC, how is it different from a laptop and is it the right computer for you? To find the answer to these questions lets take a look at tablet PC's and how they work.
Tablet PC's were originally designed to put mobile computers in the hand of people working in the field. The people using them spent the majority of their time away from a desk and wouldn't have access to a keyboard or mouse. Users would make entries via stylus or digitizer. The lightweight and highly portable nature of these types of computers made them perfectly suited to field technicians and health care workers. These original models are known as slate tablets do to their distinctive one piece design. The entire computer screen and all was encased in one small unit, usually weighing 4 pounds or less. All of the units came with ports for connecting an optional keyboard, mouse, CD/DVD drive, printer, monitor or other computer peripherals. By choosing not to include all of these peripherals computer manufacturers were able to shave off pounds and lengthen the battery life considerably.
Many people were attracted to these new tablet PC's but still wanted a traditional keyboard setup. Manufacturers responded to consumers demand and the convertible tablet PC was born. A convertible tablet PC looks very much like a small notebook computer. Aside from the monitor it functions exactly like a traditional laptop computer. The monitor is attached on special hinge that allows the monitor to swivel, making it an extremely powerful tool for small customer presentations and demonstrations. The monitor is also capable of swiveling completely around and lying on top of the keyboard with its screen facing up. This gives it the appearance of the traditional slate tablet PC. Convertible tablet PC's traditionally have a larger viewing screen, larger hard drive, larger battery, and other accessories. These extras make it a much more powerful computing platform, but they also make it heavier and more expensive.
Is a tablet PC the right PC for you? The real question is how portable does you're computing lifestyle have to be? Do you spend a lot of time outside of a traditional office environment? Do you need to use a computer to record or make notes while you're walking, or moving from place to place, if so a tablet PC is the perfect choice for you? For salespeople or business men who spend a lot of time traveling a convertible tablet is probably a much better option. It gives them more power, and more features, with a more traditional computer setup.
Find the Perfect Notebook - Computers4SURE's Notebook Finder
© Copyright TabletPC.6LN.com, All Rights Reserved.
About the Author
Eve Larson is the lead writer for the Six Level Network Tablet PC News and Review website (http://tabletpc.6ln.com).
Stay Organized - Top PDAs and Handhelds
by Eve Larson
What is a tablet PC, how is it different from a laptop and is it the right computer for you? To find the answer to these questions lets take a look at tablet PC's and how they work.
Tablet PC's were originally designed to put mobile computers in the hand of people working in the field. The people using them spent the majority of their time away from a desk and wouldn't have access to a keyboard or mouse. Users would make entries via stylus or digitizer. The lightweight and highly portable nature of these types of computers made them perfectly suited to field technicians and health care workers. These original models are known as slate tablets do to their distinctive one piece design. The entire computer screen and all was encased in one small unit, usually weighing 4 pounds or less. All of the units came with ports for connecting an optional keyboard, mouse, CD/DVD drive, printer, monitor or other computer peripherals. By choosing not to include all of these peripherals computer manufacturers were able to shave off pounds and lengthen the battery life considerably.
Many people were attracted to these new tablet PC's but still wanted a traditional keyboard setup. Manufacturers responded to consumers demand and the convertible tablet PC was born. A convertible tablet PC looks very much like a small notebook computer. Aside from the monitor it functions exactly like a traditional laptop computer. The monitor is attached on special hinge that allows the monitor to swivel, making it an extremely powerful tool for small customer presentations and demonstrations. The monitor is also capable of swiveling completely around and lying on top of the keyboard with its screen facing up. This gives it the appearance of the traditional slate tablet PC. Convertible tablet PC's traditionally have a larger viewing screen, larger hard drive, larger battery, and other accessories. These extras make it a much more powerful computing platform, but they also make it heavier and more expensive.
Is a tablet PC the right PC for you? The real question is how portable does you're computing lifestyle have to be? Do you spend a lot of time outside of a traditional office environment? Do you need to use a computer to record or make notes while you're walking, or moving from place to place, if so a tablet PC is the perfect choice for you? For salespeople or business men who spend a lot of time traveling a convertible tablet is probably a much better option. It gives them more power, and more features, with a more traditional computer setup.
Find the Perfect Notebook - Computers4SURE's Notebook Finder
© Copyright TabletPC.6LN.com, All Rights Reserved.
About the Author
Eve Larson is the lead writer for the Six Level Network Tablet PC News and Review website (http://tabletpc.6ln.com).
Monday, October 24, 2005
Purchasing Ink Cartridges
by Leon Chaddock
There is something hard and difficult about finding the right printer cartridges for your specific needs. The good news is that you do not have to worry about where you can purchase them. You don't have to hope that the office supply store down the street or in your local mall will actually be carrying them. You will find the printer cartridges that you need right here on the web.
In order to know which printer cartridges you need for your fax machine, your printer, your copier... you need to know several things. For most computer printers, you will be able to find out just what you need in the way of printer cartridges when they are ready to run out. A message will pop up and telling you so. In fact, it may even tell you what type you need to purchase. But, if not, you can find this out by referring to your owner's manual. (or simply take out your empty ink cartrige and it should have all the info you need written on it. Except maybe the exact name of your printer--A1-Computers).
What if you no longer have that owner's manual though? Many people mistakenly can't find it or they have thrown it away. There is no problem in this though, as long as you know what type of printer you have as well as what model number it is. This information is usually provided on the printer simply because they know you will lose it!
When the time comes to make the purchase on your printer cartridges, all you need to do is use the web to help you find it. You will find a wide range of products available and you may even be able to find some discounted printer cartridges out there as well. In fact there are some excellent opportunities for saving money on the printer cartridges that you need on the internet. You can find these by simply researching a few of the better websites that sell them. This is great news to all of you out there that hate spending money on those hard to find printer cartridges!
About the Author
For more information please see http://www.ink-cartridge-deals.co.uk
Saturday, October 22, 2005
The Evolution of Technology -
The History of Computers
While computers are now an important part of the lives of human beings, there was a time where computers did not exist. Knowing the history of computers and how much progression has been made can help you understand just how complicated and innovative the creation of computers really is.
Unlike most devices, the computer is one of the few inventions that does not have one specific inventor. Throughout the development of the computer, many people have added their creations to the list required to make a computer work. Some of the inventions have been different types of computers, and some of them were parts required to allow computers to be developed further.
The Beginning
Perhaps the most significant date in the history of computers is the year 1936. It was in this year that the first "computer" was developed. It was created by Konrad Zuse and dubbed the Z1 Computer. This computer stands as the first as it was the first system to be fully programmable. There were devices prior to this, but none had the computing power that sets it apart from other electronics.
It wasn't until 1942 that any business saw profit and opportunity in computers. This first company was called ABC computers, owned and operated by John Atanasoff and Clifford Berry. Two years later, the Harvard Mark I computer was developed, furthering the science of computing.
Over the course of the next few years, inventors all over the world began to search more into the study of computers, and how to improve upon them. Those next ten years say the introduction of the transistor, which would become a vital part of the inner workings of the computer, the ENIAC 1 computer, as well as many other types of systems. The ENIAC 1 is perhaps one of the most interesting, as it required 20,000 vacuum tubes to operate. It was a massive machine, and started the revolution to build smaller and faster computers.
The age of computers was forever altered by the introduction of International Business Machines, or IBM, into the computing industry in 1953. This company, over the course of computer history, has been a major player in the development of new systems and servers for public and private use. This introduction brought about the first real signs of competition within computing history, which helped to spur faster and better development of computers. Their first contribution was the IBM 701 EDPM Computer.
A Programming Language Evolves
A year later, the first successful high level programming language was created. This was a programming language not written in 'assembly' or binary, which are considered very low level languages. FORTRAN was written so that more people could begin to program computers easily.
The year 1955, the Bank of America, coupled with Stanford Research Institute and General Electric, saw the creation of the first computers for use in banks. The MICR, or Magnetic Ink Character Recognition, coupled with the actual computer, the ERMA, was a breakthrough for the banking industry. It wasn't until 1959 that the pair of systems were put into use in actual banks.
During 1958, one of the most important breakthroughs in computer history occurred, the creation of the integrated circuit. This device, also known as the chip, is one of the base requirements for modern computer systems. On every motherboard and card within a computer system, are many chips that contain information on what the boards and cards do. Without these chips, the systems as we know them today cannot function.
Gaming, Mice, & the Internet
For many computer users now, games are a vital part of the computing experience. 1962 saw the creation of the first computer game, which was created by Steve Russel and MIT, which was dubbed Spacewar.
The mouse, one of the most basic components of modern computers, was created in 1964 by Douglass Engelbart. It obtained its name from the "tail" leading out of the device.
One of the most important aspects of computers today was invented in 1969. ARPA net was the original Internet, which provided the foundation for the Internet that we know today. This development would result in the evolution of knowledge and business across the entire planet.
It wasn't until 1970 that Intel entered the scene with the first dynamic RAM chip, which resulted in an explosion of computer science innovation.
On the heels of the RAM chip was the first microprocessor, which was also designed by Intel. These two components, in addition to the chip developed in 1958, would number among the core components of modern computers.
A year later, the floppy disk was created, gaining its name from the flexibility of the storage unit. This was the first step in allowing most people to transfer bits of data between unconnected computers.
The first networking card was created in 1973, allowing data transfer between connected computers. This is similar to the Internet, but allows for the computers to connect without use of the Internet.
Household PC's Emerge
The next three years were very important for computers. This is when companies began to develop systems for the average consumer. The Scelbi, Mark-8 Altair, IBM 5100, Apple I and II, TRS-80, and the Commodore Pet computers were the forerunners in this area. While expensive, these machines started the trend for computers within common households.
One of the most major breathroughs in computer software occurred in 1978 with the release of the VisiCalc Spreadsheet program. All development costs were paid for within a two week period of time, which makes this one of the most successful programs in computer history.
1979 was perhaps one of the most important years for the home computer user. This is the year that WordStar, the first word processing program, was released to the public for sale. This drastically altered the usefulness of computers for the everyday user.
The IBM Home computer quickly helped revolutionize the consumer market in 1981, as it was affordable for home owners and standard consumers. 1981 also saw the the mega-giant Microsoft enter the scene with the MS-DOS operating system. This operating system utterly changed computing forever, as it was easy enough for everyone to learn.
The Competition Begins : Apple vs. Microsoft
Computers saw yet another vital change during the year of 1983. The Apple Lisa computer was the first with a graphical user interface, or a GUI. Most modern programs contain a GUI, which allows them to be easy to use and pleasing for the eyes. This marked the beginning of the out dating of most text based only programs.
Beyond this point in computer history, many changes and alterations have occurred, from the Apple-Microsoft wars, to the developing of microcomputers and a variety of computer breakthroughs that have become an accepted part of our daily lives. Without the initial first steps of computer history, none of this would have been possible.
About The Author:
Rebecca Blain is a professional hobbyist writer who enjoys taking care of her fish and educating people about how to build your own computer which you can learn about here: http://www.build-your-own-computer-tips.com
While computers are now an important part of the lives of human beings, there was a time where computers did not exist. Knowing the history of computers and how much progression has been made can help you understand just how complicated and innovative the creation of computers really is.
Unlike most devices, the computer is one of the few inventions that does not have one specific inventor. Throughout the development of the computer, many people have added their creations to the list required to make a computer work. Some of the inventions have been different types of computers, and some of them were parts required to allow computers to be developed further.
The Beginning
Perhaps the most significant date in the history of computers is the year 1936. It was in this year that the first "computer" was developed. It was created by Konrad Zuse and dubbed the Z1 Computer. This computer stands as the first as it was the first system to be fully programmable. There were devices prior to this, but none had the computing power that sets it apart from other electronics.
It wasn't until 1942 that any business saw profit and opportunity in computers. This first company was called ABC computers, owned and operated by John Atanasoff and Clifford Berry. Two years later, the Harvard Mark I computer was developed, furthering the science of computing.
Over the course of the next few years, inventors all over the world began to search more into the study of computers, and how to improve upon them. Those next ten years say the introduction of the transistor, which would become a vital part of the inner workings of the computer, the ENIAC 1 computer, as well as many other types of systems. The ENIAC 1 is perhaps one of the most interesting, as it required 20,000 vacuum tubes to operate. It was a massive machine, and started the revolution to build smaller and faster computers.
The age of computers was forever altered by the introduction of International Business Machines, or IBM, into the computing industry in 1953. This company, over the course of computer history, has been a major player in the development of new systems and servers for public and private use. This introduction brought about the first real signs of competition within computing history, which helped to spur faster and better development of computers. Their first contribution was the IBM 701 EDPM Computer.
A Programming Language Evolves
A year later, the first successful high level programming language was created. This was a programming language not written in 'assembly' or binary, which are considered very low level languages. FORTRAN was written so that more people could begin to program computers easily.
The year 1955, the Bank of America, coupled with Stanford Research Institute and General Electric, saw the creation of the first computers for use in banks. The MICR, or Magnetic Ink Character Recognition, coupled with the actual computer, the ERMA, was a breakthrough for the banking industry. It wasn't until 1959 that the pair of systems were put into use in actual banks.
During 1958, one of the most important breakthroughs in computer history occurred, the creation of the integrated circuit. This device, also known as the chip, is one of the base requirements for modern computer systems. On every motherboard and card within a computer system, are many chips that contain information on what the boards and cards do. Without these chips, the systems as we know them today cannot function.
Gaming, Mice, & the Internet
For many computer users now, games are a vital part of the computing experience. 1962 saw the creation of the first computer game, which was created by Steve Russel and MIT, which was dubbed Spacewar.
The mouse, one of the most basic components of modern computers, was created in 1964 by Douglass Engelbart. It obtained its name from the "tail" leading out of the device.
One of the most important aspects of computers today was invented in 1969. ARPA net was the original Internet, which provided the foundation for the Internet that we know today. This development would result in the evolution of knowledge and business across the entire planet.
It wasn't until 1970 that Intel entered the scene with the first dynamic RAM chip, which resulted in an explosion of computer science innovation.
On the heels of the RAM chip was the first microprocessor, which was also designed by Intel. These two components, in addition to the chip developed in 1958, would number among the core components of modern computers.
A year later, the floppy disk was created, gaining its name from the flexibility of the storage unit. This was the first step in allowing most people to transfer bits of data between unconnected computers.
The first networking card was created in 1973, allowing data transfer between connected computers. This is similar to the Internet, but allows for the computers to connect without use of the Internet.
Household PC's Emerge
The next three years were very important for computers. This is when companies began to develop systems for the average consumer. The Scelbi, Mark-8 Altair, IBM 5100, Apple I and II, TRS-80, and the Commodore Pet computers were the forerunners in this area. While expensive, these machines started the trend for computers within common households.
One of the most major breathroughs in computer software occurred in 1978 with the release of the VisiCalc Spreadsheet program. All development costs were paid for within a two week period of time, which makes this one of the most successful programs in computer history.
1979 was perhaps one of the most important years for the home computer user. This is the year that WordStar, the first word processing program, was released to the public for sale. This drastically altered the usefulness of computers for the everyday user.
The IBM Home computer quickly helped revolutionize the consumer market in 1981, as it was affordable for home owners and standard consumers. 1981 also saw the the mega-giant Microsoft enter the scene with the MS-DOS operating system. This operating system utterly changed computing forever, as it was easy enough for everyone to learn.
The Competition Begins : Apple vs. Microsoft
Computers saw yet another vital change during the year of 1983. The Apple Lisa computer was the first with a graphical user interface, or a GUI. Most modern programs contain a GUI, which allows them to be easy to use and pleasing for the eyes. This marked the beginning of the out dating of most text based only programs.
Beyond this point in computer history, many changes and alterations have occurred, from the Apple-Microsoft wars, to the developing of microcomputers and a variety of computer breakthroughs that have become an accepted part of our daily lives. Without the initial first steps of computer history, none of this would have been possible.
About The Author:
Rebecca Blain is a professional hobbyist writer who enjoys taking care of her fish and educating people about how to build your own computer which you can learn about here: http://www.build-your-own-computer-tips.com
Wednesday, October 19, 2005
The Newbie's Guide to Personal Computer Maintenance
When you turn on your computer, does it act like it needs a coffee to wake up? When you surf around the Internet, are you bombarded with pop-up windows? Does your computer freeze up or turn off for no apparent reason?
Before you decide to throw your monitor out of the nearest window, there may be a number of solutions to fix these problems that won't require you having a degree in computer technology.
There are two primary ways to maintain your computer's performance, and the maintenance should be done once a week or more. First, acquire and use software that will help you clean and protect your computer, and second, know how to use the programs already in your computer to keep it's engines running smooth.
SOFTWARE
The software solutions below will not cost you any money, nor will they take you much of your time to download, understand, and implement:
1) Virus Protection - Avast AntiVirus is an excellent free program to guard yourself against Trojans, Worms, and Hacks.
2) Spyware - AdAware and Spybot are terrific free programs for eliminating pop-ups and other wares from your computer. It is recommended that you use them both, as one may find problems that the other may not ... a great one-two punch to protect yourself.
3) Registry Cleaners - WinASO Registry Optimizer is a great program for repairing your computer registry. The free version allows you to clean or repair ten items at a time, so you will have to re-run it numerous times if you have many problems.
4) Internet Speed - If you use dial-up, or have a computer the size of a calculator, you may wish to use RamBooster to help give you the best speed possible for the limitations you have.
Go to http://www.download.com for these and other great resources.
PROGRAMS
Now that you've taken out the garbage, you should keep the place neat and tidy by using the programs already existing in your computer. Once again, you should do this once a week:
1) Clear your Internet History
2) Defrag your Computer
3) Use a Firewall
You can find the programs that will do this for you by looking in the System Tools or Security Center sections of your computer.
Another option for those of you who've got smoke billowing out of the back of your computer, with no seemingly useful solution in sight; you may wish to look at the System Restore feature that your computer may have. This allows you to revert back to a state when your computer actually worked well. It doesn't work all the time, by it is an option ... and not an end all be all ... use it only when absolutely necessary.
Austin Culley is the Chief Operating Officer for Oil-Net.Com Inc.http://www.oil-net.com
Article Source: http://EzineArticles.com/
For more computer tips
Before you decide to throw your monitor out of the nearest window, there may be a number of solutions to fix these problems that won't require you having a degree in computer technology.
There are two primary ways to maintain your computer's performance, and the maintenance should be done once a week or more. First, acquire and use software that will help you clean and protect your computer, and second, know how to use the programs already in your computer to keep it's engines running smooth.
SOFTWARE
The software solutions below will not cost you any money, nor will they take you much of your time to download, understand, and implement:
1) Virus Protection - Avast AntiVirus is an excellent free program to guard yourself against Trojans, Worms, and Hacks.
2) Spyware - AdAware and Spybot are terrific free programs for eliminating pop-ups and other wares from your computer. It is recommended that you use them both, as one may find problems that the other may not ... a great one-two punch to protect yourself.
3) Registry Cleaners - WinASO Registry Optimizer is a great program for repairing your computer registry. The free version allows you to clean or repair ten items at a time, so you will have to re-run it numerous times if you have many problems.
4) Internet Speed - If you use dial-up, or have a computer the size of a calculator, you may wish to use RamBooster to help give you the best speed possible for the limitations you have.
Go to http://www.download.com for these and other great resources.
PROGRAMS
Now that you've taken out the garbage, you should keep the place neat and tidy by using the programs already existing in your computer. Once again, you should do this once a week:
1) Clear your Internet History
2) Defrag your Computer
3) Use a Firewall
You can find the programs that will do this for you by looking in the System Tools or Security Center sections of your computer.
Another option for those of you who've got smoke billowing out of the back of your computer, with no seemingly useful solution in sight; you may wish to look at the System Restore feature that your computer may have. This allows you to revert back to a state when your computer actually worked well. It doesn't work all the time, by it is an option ... and not an end all be all ... use it only when absolutely necessary.
Austin Culley is the Chief Operating Officer for Oil-Net.Com Inc.http://www.oil-net.com
Article Source: http://EzineArticles.com/
For more computer tips
Saturday, October 15, 2005
LAPTOP CONNECTIONS TO MULTIPLE NETWORKS
I. CONNECTING A LAPTOP TO MULTIPLE NETWORKS
Having a notebook or laptop provides the freedom to be truly mobile. You can work in many places and situations. But this brings an annoyance: if you move your notebook between various different networks, you always have to change network settings. Recently my employer has issued me a brand new notebook. When I came home at the end of the day, I had to disable DHCP, set up an IP-address and DNS configuration. Next morning I needed to reverse my configuration to work at my office. The real headache began when I went to our customer site...
II. SWITCHING NETWORK SETTINGS ON THE FLY
There are three ways to switch a notebook between networks with one click. First is to use a built-in windows feature of saving and loading network settings. This way is for experienced users. Second is by using Windows XP "alternate configuration" feature. The third way is to use third-party utilities like Net Profile Switch, IPSwitch etc. Let's discuss all three.
III. WINDOWS "NETSH" UTILITY
Windows 2000 comes with the "netsh" utility that gives you the possibility to "dump" all network settings into a file which you can later use to restore your complete Network settings.
To Save the current Settings use. . .
To view the rest of this article on connecting a laptop to multiple networks
Having a notebook or laptop provides the freedom to be truly mobile. You can work in many places and situations. But this brings an annoyance: if you move your notebook between various different networks, you always have to change network settings. Recently my employer has issued me a brand new notebook. When I came home at the end of the day, I had to disable DHCP, set up an IP-address and DNS configuration. Next morning I needed to reverse my configuration to work at my office. The real headache began when I went to our customer site...
II. SWITCHING NETWORK SETTINGS ON THE FLY
There are three ways to switch a notebook between networks with one click. First is to use a built-in windows feature of saving and loading network settings. This way is for experienced users. Second is by using Windows XP "alternate configuration" feature. The third way is to use third-party utilities like Net Profile Switch, IPSwitch etc. Let's discuss all three.
III. WINDOWS "NETSH" UTILITY
Windows 2000 comes with the "netsh" utility that gives you the possibility to "dump" all network settings into a file which you can later use to restore your complete Network settings.
To Save the current Settings use. . .
To view the rest of this article on connecting a laptop to multiple networks
Wednesday, October 12, 2005
The Main Components of Any Computer
Computers are everywhere, and vary in specification, brands, sizes, shaped, and prices. However, there is one common characteristic among all computer systems.
Whether we are talking standalone home pc, high performance networked servers, Unix computers, Linux, Windows, or Macs, they all have five main components: Input device, Output device, Central Processing Unit, Memory, and Storage device.
Here is a listing of these parts and what they do:
1. The input device is used to enter the data into the computer. Examples of input devices are: Keyboards, Scanners, or light pens.
2. The output device is used to redirect the processed data to a device connected the output connection of the computer. Examples of output devices are: Monitors, Printers.
3. The Central Processing Unit is where the computer processes data and coordinates tasks among different components of the computer.
For the rest of this article on the components of any computer go to A1-Computers.net
Whether we are talking standalone home pc, high performance networked servers, Unix computers, Linux, Windows, or Macs, they all have five main components: Input device, Output device, Central Processing Unit, Memory, and Storage device.
Here is a listing of these parts and what they do:
1. The input device is used to enter the data into the computer. Examples of input devices are: Keyboards, Scanners, or light pens.
2. The output device is used to redirect the processed data to a device connected the output connection of the computer. Examples of output devices are: Monitors, Printers.
3. The Central Processing Unit is where the computer processes data and coordinates tasks among different components of the computer.
For the rest of this article on the components of any computer go to A1-Computers.net
Monday, October 10, 2005
A Guide to Refurbished IBM Laptops
Great computers and great deals can be found in refurbished computers, check it out!
IBM boasts a very large array of older and newer refurbished laptops on their website ibm.com. Look for "Notebooks: IBM Certified Used Equipment." There you can buy any of dozens of models and variations, for hundreds of dollars less than new models. IBM inspects all of their returned laptops (including the batteries, as with most factory-refurbished laptops), makes sure they up and running at top speed, and repackages them for resale.
Most IBM refurbished laptops are ThinkPad A-series or T-series. A-series are heavier, but much more powerful, since they are designed to replace desktop computers. They can handle everything your desktop computer used to handle, plus they fit in your laptop carrying case. A-series models are generally more expensive than those in the T-series.
IBM T-series notebooks are made to be a little more powerful and a lot lighter and smaller than the A-series models. They were introduced to satiate those who were demanding a more portable model, so they could take all of their work with them wherever they went. Since they are a newer series, and because they are starting to replace the A-series, the T-series models are a bit more expensive.
As with most laptops refurbishing factories, IBM offers a three-month warranty and guarantee on all of their refurbished laptops - including for the battery. Third-party refurbishers also offer a ninety-day warranty, but with no warranty on the battery.
For more on refurbished computers Check out A1-Computers
About the Author
Refurbished Laptops Info provides detailed information on quality, cheap refurbished laptops by manufacturers like Dell, IBM, Toshiba, and HP, as well as refurbished laptop batteries and related products. Refurbished Laptops Info is the sister site of Rack Mount Computers Web.
IBM boasts a very large array of older and newer refurbished laptops on their website ibm.com. Look for "Notebooks: IBM Certified Used Equipment." There you can buy any of dozens of models and variations, for hundreds of dollars less than new models. IBM inspects all of their returned laptops (including the batteries, as with most factory-refurbished laptops), makes sure they up and running at top speed, and repackages them for resale.
Most IBM refurbished laptops are ThinkPad A-series or T-series. A-series are heavier, but much more powerful, since they are designed to replace desktop computers. They can handle everything your desktop computer used to handle, plus they fit in your laptop carrying case. A-series models are generally more expensive than those in the T-series.
IBM T-series notebooks are made to be a little more powerful and a lot lighter and smaller than the A-series models. They were introduced to satiate those who were demanding a more portable model, so they could take all of their work with them wherever they went. Since they are a newer series, and because they are starting to replace the A-series, the T-series models are a bit more expensive.
As with most laptops refurbishing factories, IBM offers a three-month warranty and guarantee on all of their refurbished laptops - including for the battery. Third-party refurbishers also offer a ninety-day warranty, but with no warranty on the battery.
About the Author
Refurbished Laptops Info provides detailed information on quality, cheap refurbished laptops by manufacturers like Dell, IBM, Toshiba, and HP, as well as refurbished laptop batteries and related products. Refurbished Laptops Info is the sister site of Rack Mount Computers Web.
Saturday, October 08, 2005
The ABCs Of Computer Memory
Does your computer need more memory? Have no idea how much to get? Read the article below before you shop and you will know what you need. A1-Computers--
Find the right RAM for your computer in just two clicks. 4AllMemory.com The Memory Experts.
Computer memory is called Random Access Memory (RAM). The information stored in RAM can be accessed randomly, rather than sequentially. This means that data can be found in any location at the same rate of speed. Other storage media, such as CD-Rom and hard drives, must wait while the drive spins to the correct location before the data can be accessed.
Computer memory is simply a storage area for the program code and the data that program uses. Computer programs use RAM to write and retrieve information, allowing for fast data retrieval and manipulation.
How Much RAM is Enough?
Simply stated, the answer is, as much as possible. Keep in mind, though, once you've reached a certain upper limit, which is determined by the computer program(s) used, investment in more memory will see a diminished return.
Adding more memory is one of the best ways to maximize computer performance. If you compare 2 identical computer systems, the one with the most memory will over-all be the faster. More RAM allows the computer to place more program instructions into memory, relying less on the slower hard drive.
Think of 512 Megabytes (MB) as the base standard for a modern computer. With that you can multi-task (run several applications concurrently). For instance, you can check email and download MP3s, without noticeable sluggishness.
Some applications, however, are more memory-hungry than others. Graphics programs, for example, are notoriously greedy. Memory needs are further exagerated by the operating system used. Microsoft Windows is far more demanding than, say, Linux. Currently, most PCs use Windows, though.
Should you notice your computer slowing down, consider adding more memory. Before committing to that option, however, try de-fragmenting your hard drive with a utility (program) designed for that sole purpose. A fragmented hard drive is a common cause of stalled computer performance.
Types of RAM
Right now DDR SDRAM is the most popular memory module. DDR stands for Double Data Rate, which means that the memory can be accessed twice per clock-cycle. SDRAM, the acronym for Synchronous Data Random Access Memory, has been the standard for memory modules for nearly a decade.
To add memory to your computer, you must install modules with the correct contact layout. Before purchasing new memory, you must know which type your motherboard will accept. The most common form factors are 168 pin, 184 pin and 200 pin.
You'll also need to know whether there are slots available on your motherboard. If all the slots are already in use, you'll have to replace 1 or all of the current modules with higher capacity ones. If there is at least 1 free slot, you can simply buy a new memory module and insert it in the empty slot.
A word of caution: whereas some motherboards can accept either SDRAM or DDR SDRAM, the 2 types cannot be mixed. You must decide on 1 or the other. Check the motherboard manual first to determine which kind of memory your computer requires.
And finally, when you are ready to install your brand new memory module, make sure of 2 things: the power is off (for your safety) and you are electrically grounded (for your computer's safety).
For more computer tips A1-Computers.net
Ron King is a full-time researcher, writer, and web developer. Visit http://www.build-computer-now.com to learn more about this fascinating subject.
Copyright 2005 Ron King. This article may be reprinted if the resource box is left intact.
Article Source: http://EzineArticles.com/
Find the right RAM for your computer in just two clicks. 4AllMemory.com The Memory Experts.
Computer memory is called Random Access Memory (RAM). The information stored in RAM can be accessed randomly, rather than sequentially. This means that data can be found in any location at the same rate of speed. Other storage media, such as CD-Rom and hard drives, must wait while the drive spins to the correct location before the data can be accessed.
Computer memory is simply a storage area for the program code and the data that program uses. Computer programs use RAM to write and retrieve information, allowing for fast data retrieval and manipulation.
How Much RAM is Enough?
Simply stated, the answer is, as much as possible. Keep in mind, though, once you've reached a certain upper limit, which is determined by the computer program(s) used, investment in more memory will see a diminished return.
Adding more memory is one of the best ways to maximize computer performance. If you compare 2 identical computer systems, the one with the most memory will over-all be the faster. More RAM allows the computer to place more program instructions into memory, relying less on the slower hard drive.
Think of 512 Megabytes (MB) as the base standard for a modern computer. With that you can multi-task (run several applications concurrently). For instance, you can check email and download MP3s, without noticeable sluggishness.
Some applications, however, are more memory-hungry than others. Graphics programs, for example, are notoriously greedy. Memory needs are further exagerated by the operating system used. Microsoft Windows is far more demanding than, say, Linux. Currently, most PCs use Windows, though.
Should you notice your computer slowing down, consider adding more memory. Before committing to that option, however, try de-fragmenting your hard drive with a utility (program) designed for that sole purpose. A fragmented hard drive is a common cause of stalled computer performance.
Types of RAM
Right now DDR SDRAM is the most popular memory module. DDR stands for Double Data Rate, which means that the memory can be accessed twice per clock-cycle. SDRAM, the acronym for Synchronous Data Random Access Memory, has been the standard for memory modules for nearly a decade.
To add memory to your computer, you must install modules with the correct contact layout. Before purchasing new memory, you must know which type your motherboard will accept. The most common form factors are 168 pin, 184 pin and 200 pin.
You'll also need to know whether there are slots available on your motherboard. If all the slots are already in use, you'll have to replace 1 or all of the current modules with higher capacity ones. If there is at least 1 free slot, you can simply buy a new memory module and insert it in the empty slot.
A word of caution: whereas some motherboards can accept either SDRAM or DDR SDRAM, the 2 types cannot be mixed. You must decide on 1 or the other. Check the motherboard manual first to determine which kind of memory your computer requires.
And finally, when you are ready to install your brand new memory module, make sure of 2 things: the power is off (for your safety) and you are electrically grounded (for your computer's safety).
For more computer tips A1-Computers.net
Ron King is a full-time researcher, writer, and web developer. Visit http://www.build-computer-now.com to learn more about this fascinating subject.
Copyright 2005 Ron King. This article may be reprinted if the resource box is left intact.
Article Source: http://EzineArticles.com/
Friday, October 07, 2005
Wireless Networking, Part 2:
There is a lot of helpful info on how to keep your wireless network safe and secure. I hope it is very helpful for you. A1-Computers--
For more on laptop or notebook computers
Sign Up for Boingo Wireless and Get Your Second Month FREE!
Setup and Security
The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed. The physical installation of a wireless network may be easier than a wired network, but the more difficult part is setting up the software and security to make sure everything stays up and running without incident.
Although this Tech Tip is by no means an exhaustive resource on configuring a wireless network, it will provide information and pointers that can be applied to most typical installations. Many of these tips are general enough that they may provide some good advice for those utilizing wired networks as well.
For the sake of this article, we will assume that the hardware has been successfully installed physically, and that the user is now prepared to set up and secure the system through software. Wireless devices, especially routers / access points, generally include a web-based configuration utility that allows the user to customize the hardware to meet their needs. The hardware will most likely work with minimal configuration, but to make it work so that the integrity of the network is protected may take a few more steps.
In addition to the configuration interface provided with the wireless networking hardware, Microsoft has integrated a “Wireless Network Setup Wizard” with the release of Windows XP Service Pack 2 that will lead a user of any expertise through the installation of their network. In addition, the “Microsoft Broadband Network Utility” will help them monitor and maintain the network just as easily once it is set up.
Change Default Password
Routers, whether wired or wireless, require a password for configuring the various settings, and all of them ship with extremely simple default passwords. The first step taken in setting up the router should be to change the default password to something more difficult to guess. Longer passwords that use a combination of letters and numbers are preferable as they make hacking attempts that much more difficult.
Change Router IP Address
Most routers ship with a default IP (Internet Protocol) address, something like 192.168.1.1, which is utilized by the user for accessing the configuration utility interface, as well as by the network itself for negotiating the LAN and WAN connections. The configuration utility of most routers will include a page that will allow for the default IP address to be manually changed by the user. Although changing the default IP address doesn’t provide a great amount of security since it can easily be discovered anyway, it may deter intrusion by local users that may be casually scanning the network.
Configure Router or Access Point Use
In the first part of this series of Tech Tips, I mentioned that almost all routers intended for home use can also double as wireless access points, and this is generally accomplished by clicking a check box within the control panel software. If a wireless router is being added to a network with an existing router and broadband connection, the new device needs to be set to access point mode. Otherwise, there could be a conflict as the network may not know where to expect the internet connection, since it will now have two routers that both want to serve as the gateway. If the wireless router is replacing an existing router, or is the only one on the network, this should not be an issue as these devices generally ship configured to operate as a router by default.
Broadcasting the SSID
The SSID, or Service Set Identifier, is basically the name assigned to a particular wireless network. The user can choose just about any name they want, as long as it is less than 32 characters long, and they just need to be sure that all computers on the network are configured to use the same name. Two steps related to the SSID can be taken to help improve the security of the network:
First, change the default SSID to a unique name that includes a combination of letters and numbers that doesn’t reveal anything personal about you or your network. Second, disable the broadcast of the SSID once all of your computers are successfully connected, even if your router / access point recommends broadcasting it. I have used a few wireless routers, and all of them have a check box in the control panel for enabling/disabling the broadcast of the SSID, and they have all recommended leaving broadcasting enabled. Broadcasting the SSID allows new computers to easily find your network, and then all they have to do is access it given the proper credentials. Broadcasting your SSID puts it out there for anyone within range to see, and it just allows would-be hackers to get one step closer to compromising your security. In a home environment, there are probably few computers that need to access the network, and if more are ever added, you can temporarily enable the broadcast to get them set up.
DHCP Server
The DHCP (Dynamic Host Configuration Protocol) Server is a feature of most routers that makes adding new computers extremely simple. Whenever a new computer connects to the network, the router will assign an IP address to it, instead of the user having to assign an IP address to each manually while sitting at that particular computer. This makes configuring a network very easy, but it also leaves the network vulnerable, as any new computer detected will be welcomed to the neighborhood and assigned an IP address automatically. Two different approaches can be taken to improve security, as related to the DHCP server:
One method, and the best as far as security is concerned, is to disable the DHCP server. This will require that all computers that are authorized to connect to the network be configured manually, but it will prevent unauthorized computers from obtaining an IP address. The second method, which doesn’t provide bulletproof security, is better than doing nothing. In general, a DHCP server can support up to 250 computers, and by default leaves a range of addresses readily available for that many to connect. If disabling the DHCP server doesn’t seem convenient for a user, they can limit the DHCP server to only provide as many IP addresses as they know they need. If you know there will never be more than five computers connected, limit the range of available IP addresses to a total of five within the configuration utility.
Different Levels of Encryption
All wireless components support some sort of encryption, which simply scrambles the information being sent across the network so that it can not easily be read by anyone else connected to the network. There are different types and levels of encryption, and a brief overview is provided for them below:
WEP, or Wireless Equivalency Protocol, was the first format of encryption available on wireless networks. WEP allows the network administrator to assign an encryption string to be shared by all computers authorized to access the wireless network. The encryption through WEP is either 64bit, 128bit, or 256bit, where the higher number represents greater encryption, and the strings can be generated by the administrator as a series of letters and numbers.
WPA, or “Wi-Fi Protected Access,” is an improvement over WEP that starts off with a similar master encryption string and then mathematically derives encryption keys to keep the security dynamic. WPA continually changes the encryption keys used for each packet of data, and due to the extra processing required to support this protocol the overall throughput of the connection may suffer slightly. Despite the potential for decreased speed, WPA is considered to be far more robust than WEP, and should be implemented where possible. In some instances, WEP encryption has actually been defeated, making WPA all that more appealing.
Although most components support both of these encryption formats, and users can select the type they wish to use from within the control software, not all do. All devices on the network must be set to operate at the same level of encryption, which may mean that some devices will force others to be less secure than they are capable of. For example, a wireless network setup around this router (http://www.geeks.com/details.asp?invtid=DI-824VUP&cat=NET) could support either WEP or WPA encryption. When two computers are added to this network using one of these network adaptors (http://www.geeks.com/details.asp?invtid=WN-4054P&cat=NET) in one case, and one of these network adaptors (http://www.geeks.com/details.asp?invtid=PBW006-N&cat=NET) in the other case, things change. Note that the second adaptor does not support WPA; therefore the whole network must now be configured to use WEP to accommodate it.
Router Position
As discussed in the first part of this Tech Tip, wireless devices can have a range of up to a few hundred feet in free space. When installed inside a home, this range may decrease greatly due to walls, floors and other obstructions, but the signal may still be strong enough to carry beyond the confines of the dwelling. A simple step that may help reduce the strength and reach of the network signal outside the house is to position the router / access point as close to the center of the house as possible. The potential for someone to detect the network from outside the home when positioned like this is now much less than if the router was placed near a window, for example.
Final Words
There are definitely additional issues that could be considered when setting up a wireless network, but covering these basics will make a wireless network much more secure than it was straight out of the box. Many people are confident that no one would be interested in their home network and feel security is just one more headache of technical mumbo-jumbo that they would rather not deal with. Whether a hacker wants access to personal files on the network or to simply gain unauthorized access to the Internet, a few simple steps are worth the peace of mind to know you are as secure as possible.
Jason KohrsComputer Geeks tech tips and computer help.
Article Source: http://EzineArticles.com/
For more on laptop or notebook computers
Sign Up for Boingo Wireless and Get Your Second Month FREE!
Setup and Security
The first installment in this two-part series of Tech Tips provided an introduction to the basic capabilities and hardware involved in wireless networking. In the final installment of this two-part series, we will look at some of the basic setup and security considerations that should be addressed. The physical installation of a wireless network may be easier than a wired network, but the more difficult part is setting up the software and security to make sure everything stays up and running without incident.
Although this Tech Tip is by no means an exhaustive resource on configuring a wireless network, it will provide information and pointers that can be applied to most typical installations. Many of these tips are general enough that they may provide some good advice for those utilizing wired networks as well.
For the sake of this article, we will assume that the hardware has been successfully installed physically, and that the user is now prepared to set up and secure the system through software. Wireless devices, especially routers / access points, generally include a web-based configuration utility that allows the user to customize the hardware to meet their needs. The hardware will most likely work with minimal configuration, but to make it work so that the integrity of the network is protected may take a few more steps.
In addition to the configuration interface provided with the wireless networking hardware, Microsoft has integrated a “Wireless Network Setup Wizard” with the release of Windows XP Service Pack 2 that will lead a user of any expertise through the installation of their network. In addition, the “Microsoft Broadband Network Utility” will help them monitor and maintain the network just as easily once it is set up.
Change Default Password
Routers, whether wired or wireless, require a password for configuring the various settings, and all of them ship with extremely simple default passwords. The first step taken in setting up the router should be to change the default password to something more difficult to guess. Longer passwords that use a combination of letters and numbers are preferable as they make hacking attempts that much more difficult.
Change Router IP Address
Most routers ship with a default IP (Internet Protocol) address, something like 192.168.1.1, which is utilized by the user for accessing the configuration utility interface, as well as by the network itself for negotiating the LAN and WAN connections. The configuration utility of most routers will include a page that will allow for the default IP address to be manually changed by the user. Although changing the default IP address doesn’t provide a great amount of security since it can easily be discovered anyway, it may deter intrusion by local users that may be casually scanning the network.
Configure Router or Access Point Use
In the first part of this series of Tech Tips, I mentioned that almost all routers intended for home use can also double as wireless access points, and this is generally accomplished by clicking a check box within the control panel software. If a wireless router is being added to a network with an existing router and broadband connection, the new device needs to be set to access point mode. Otherwise, there could be a conflict as the network may not know where to expect the internet connection, since it will now have two routers that both want to serve as the gateway. If the wireless router is replacing an existing router, or is the only one on the network, this should not be an issue as these devices generally ship configured to operate as a router by default.
Broadcasting the SSID
The SSID, or Service Set Identifier, is basically the name assigned to a particular wireless network. The user can choose just about any name they want, as long as it is less than 32 characters long, and they just need to be sure that all computers on the network are configured to use the same name. Two steps related to the SSID can be taken to help improve the security of the network:
First, change the default SSID to a unique name that includes a combination of letters and numbers that doesn’t reveal anything personal about you or your network. Second, disable the broadcast of the SSID once all of your computers are successfully connected, even if your router / access point recommends broadcasting it. I have used a few wireless routers, and all of them have a check box in the control panel for enabling/disabling the broadcast of the SSID, and they have all recommended leaving broadcasting enabled. Broadcasting the SSID allows new computers to easily find your network, and then all they have to do is access it given the proper credentials. Broadcasting your SSID puts it out there for anyone within range to see, and it just allows would-be hackers to get one step closer to compromising your security. In a home environment, there are probably few computers that need to access the network, and if more are ever added, you can temporarily enable the broadcast to get them set up.
DHCP Server
The DHCP (Dynamic Host Configuration Protocol) Server is a feature of most routers that makes adding new computers extremely simple. Whenever a new computer connects to the network, the router will assign an IP address to it, instead of the user having to assign an IP address to each manually while sitting at that particular computer. This makes configuring a network very easy, but it also leaves the network vulnerable, as any new computer detected will be welcomed to the neighborhood and assigned an IP address automatically. Two different approaches can be taken to improve security, as related to the DHCP server:
One method, and the best as far as security is concerned, is to disable the DHCP server. This will require that all computers that are authorized to connect to the network be configured manually, but it will prevent unauthorized computers from obtaining an IP address. The second method, which doesn’t provide bulletproof security, is better than doing nothing. In general, a DHCP server can support up to 250 computers, and by default leaves a range of addresses readily available for that many to connect. If disabling the DHCP server doesn’t seem convenient for a user, they can limit the DHCP server to only provide as many IP addresses as they know they need. If you know there will never be more than five computers connected, limit the range of available IP addresses to a total of five within the configuration utility.
Different Levels of Encryption
All wireless components support some sort of encryption, which simply scrambles the information being sent across the network so that it can not easily be read by anyone else connected to the network. There are different types and levels of encryption, and a brief overview is provided for them below:
WEP, or Wireless Equivalency Protocol, was the first format of encryption available on wireless networks. WEP allows the network administrator to assign an encryption string to be shared by all computers authorized to access the wireless network. The encryption through WEP is either 64bit, 128bit, or 256bit, where the higher number represents greater encryption, and the strings can be generated by the administrator as a series of letters and numbers.
WPA, or “Wi-Fi Protected Access,” is an improvement over WEP that starts off with a similar master encryption string and then mathematically derives encryption keys to keep the security dynamic. WPA continually changes the encryption keys used for each packet of data, and due to the extra processing required to support this protocol the overall throughput of the connection may suffer slightly. Despite the potential for decreased speed, WPA is considered to be far more robust than WEP, and should be implemented where possible. In some instances, WEP encryption has actually been defeated, making WPA all that more appealing.
Although most components support both of these encryption formats, and users can select the type they wish to use from within the control software, not all do. All devices on the network must be set to operate at the same level of encryption, which may mean that some devices will force others to be less secure than they are capable of. For example, a wireless network setup around this router (http://www.geeks.com/details.asp?invtid=DI-824VUP&cat=NET) could support either WEP or WPA encryption. When two computers are added to this network using one of these network adaptors (http://www.geeks.com/details.asp?invtid=WN-4054P&cat=NET) in one case, and one of these network adaptors (http://www.geeks.com/details.asp?invtid=PBW006-N&cat=NET) in the other case, things change. Note that the second adaptor does not support WPA; therefore the whole network must now be configured to use WEP to accommodate it.
Router Position
As discussed in the first part of this Tech Tip, wireless devices can have a range of up to a few hundred feet in free space. When installed inside a home, this range may decrease greatly due to walls, floors and other obstructions, but the signal may still be strong enough to carry beyond the confines of the dwelling. A simple step that may help reduce the strength and reach of the network signal outside the house is to position the router / access point as close to the center of the house as possible. The potential for someone to detect the network from outside the home when positioned like this is now much less than if the router was placed near a window, for example.
Final Words
There are definitely additional issues that could be considered when setting up a wireless network, but covering these basics will make a wireless network much more secure than it was straight out of the box. Many people are confident that no one would be interested in their home network and feel security is just one more headache of technical mumbo-jumbo that they would rather not deal with. Whether a hacker wants access to personal files on the network or to simply gain unauthorized access to the Internet, a few simple steps are worth the peace of mind to know you are as secure as possible.
Jason KohrsComputer Geeks tech tips and computer help.
Article Source: http://EzineArticles.com/
Thursday, October 06, 2005
How Does A Wireless Network Work?
Wireless networks work using radio waves instead of wires to transmit data between computers. That's the simple version. If you're curious to know what's going on in more detail, then it's all explained in this article.
Get Your Second Month FREE at Boingo!
Ones and Zeros.
I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time. That doesn't stop a computer from using them, though.
Morse Code.
The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash). It was used manually for years, and became a great way of getting information from one place to another with the invention of the telegraph. More importantly for this example, though, it is a binary system, just like a computer's ones and zeros.
You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.
All About Frequencies
You might wonder, though, how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.
First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.
In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.
Access Points.
The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.
They Understand Each Other.
That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.
You Don't Need to Worry.
If all this talk of frequencies has you a little worried, you don't need to be -- wireless networking hardware and software handles all of this automatically, without you needing to do a thing. Don't think that you're going to have to tell one wireless device what frequency another is using, because it's just not going to happen, alright? Wireless networking, for all its complicated workings, is really far more simple to use than you'd ever expect.
For more interesting and educational articles about laptop computers go to A1-computers.net
About the Author
John is a world recognized expert on wireless networking and network management. His blog can be found at http://www.wirelessinternetonline.com.
Get Your Second Month FREE at Boingo!
Ones and Zeros.
I'm sure you know that computers transmit data digitally, using binary: ones and zeros. This is a way of communicating that translates very well to radio waves, since the computer can transmit ones and zeros as different kinds of beep. These beeps are so fast that they're outside a human's hearing range -- radio waves that you can't hear are, in fact, all around you all the time. That doesn't stop a computer from using them, though.
Morse Code.
The way it works is a lot like Morse code. You probably already know that Morse code is a way of representing the alphabet so that it can be transmitted over radio using a dot (short beep) and a dash (long dash). It was used manually for years, and became a great way of getting information from one place to another with the invention of the telegraph. More importantly for this example, though, it is a binary system, just like a computer's ones and zeros.
You might think of wireless networking, then, as being like Morse code for computers. You plug a combined radio receiver and transmitter in, and the computer is able to send out its equivalent of dots and dashes (bits, in computer-speak) to get your data from one place to another.
All About Frequencies
You might wonder, though, how the computer could possibly transmit enough bits to send and receive data at the speed it does. After all, there must be a limit on how much can be sent in a second before it just becomes useless nonsense, right? Well, yes, but the key to wireless networking is that it gets around this problem.
First of all, wireless transmissions are sent at very high frequencies, meaning that more data can be sent per second. Most wireless connections use a frequency of 2.4 gigahertz (2.4 billion cycles per second) -- a similar frequency to mobile phones and microwave ovens. As you might know, though, a frequency this high means that the wavelength must be very short, which is why wireless networking only works over a limited area.
In addition, wireless networks make use of a technique known as 'frequency hopping'. They use dozens of frequencies in the range they are given, and constantly switch between them. This makes wireless networks more immune to interference from other radio signals than they would be if they only transmitted on one frequency.
Access Points.
The final step is when it comes to all the computers on a network sharing Internet access. This is done using a special piece of wireless equipment called an access point. Access points are more expensive than wireless cards for one computer, as they contain radios that are capable of talking to around 100 computers at the same time, and sharing out access to the Internet between them. Dedicated access points are only really essential for larger networks, though -- if you only have a few computers, it is possible to use one of them as the access point, or you could just get a wireless router.
They Understand Each Other.
That's all well and good, then, but how does wireless equipment made by entirely different companies manage to work together when this is all so complicated? Well, the answer is that there are standards that all wireless devices follow. These standards are technically called the 802.11 standards, and are set by the IEEE (Institute of Electrical and Electronics Engineers). It is thanks to people sticking to their standards that wireless networking is so easy and cheap to use today.
You Don't Need to Worry.
If all this talk of frequencies has you a little worried, you don't need to be -- wireless networking hardware and software handles all of this automatically, without you needing to do a thing. Don't think that you're going to have to tell one wireless device what frequency another is using, because it's just not going to happen, alright? Wireless networking, for all its complicated workings, is really far more simple to use than you'd ever expect.
For more interesting and educational articles about laptop computers go to A1-computers.net
About the Author
John is a world recognized expert on wireless networking and network management. His blog can be found at http://www.wirelessinternetonline.com.
Wednesday, October 05, 2005
Dell Inspiron 9300 Notebook Computer Review
Dell has some of the best deals on Laptop/Notebook computers. See what the new Dell Inspiron 9300 notebook computer has to offer below. A1-Computers--
The Dell Inspiron 9300 is the latest offering from the venerable manufacturer of personal computers. Widely touted as an “entertainment powerhouse,” the 9300 promises to deliver exceptional performance for the multimedia fan. Let’s take a look at what makes this notebook computer the standout that it is.
You have to admire Dell. Not a month goes by where a new model is offered, prices are reduced, and the whole package is sweetened with the inclusion of some sort of free upgrade. True to form, the Dell Inspiron 9300 notebook computer is a prime example of all that as it is a new model, fully loaded, and is available to you at an attractive price.
Some of the top features of this particular model include:
A 17" screen – perfect for gamers and movie watchers.
Intel Pentium M Processor 730 (1.60 GHz/2MB Cache/533MHz FSB).
A whopping 1 GB of memory.
80GB hard drive.
Microsoft Windows XP Media Center Edition 2005.
8x CD/DVD burner (DVD+/-RW) with double-layer write capability.
McAfee Security Center.
3 Year Service Plan.
Depending on how you order the 9300 some of the included features may be slightly different. All models do come equipped with PCI Express graphics options for entertainment applications, including: digital video editing, digital photography, and movies. However, to watch television or view your DVDS, you must purchase the optional TV tuner for an extra $150. Another drawback is that you cannot play audio or video on the 9300 without booting up; some will find this step to be a big inconvenience. Expect future models from Dell to rectify this oversight.
The 9300 is no lightweight, weighing in at just over 9 lbs.; of course if you are moving from a desktop unit the weight will seem inconsequential.
Perhaps the best feature of the 9300 is its price. Dell is forever running specials on just about everything they sell. This particular model retails for $2209 on their site, but with an instant rebate of $750 your price begins at $1459. Even with taxes, shipping and handling charges, the tuner, and a couple of software packages thrown in you can still get the 9300 for under $2000. Comparable models from HP, Gateway, and Toshiba are likely to run several hundreds dollars more than the 9300 and Dell’s special price includes their popular three year extended warranty.
Overall, the 9300 is a nice entrant in the “full blown entertainment” category of notebook computers. With the low price and extended warranty you will find that it is a value leader as well.
Buy a DELL Now!
See what else is new at Dell at A1-Computers.net
Matthew Keegan is The Article Writer who writes on just about any and every issue imaginable. You can preview samples from his high performing site at http://www.thearticlewriter.com
Article Source: http://EzineArticles.com/
The Dell Inspiron 9300 is the latest offering from the venerable manufacturer of personal computers. Widely touted as an “entertainment powerhouse,” the 9300 promises to deliver exceptional performance for the multimedia fan. Let’s take a look at what makes this notebook computer the standout that it is.
You have to admire Dell. Not a month goes by where a new model is offered, prices are reduced, and the whole package is sweetened with the inclusion of some sort of free upgrade. True to form, the Dell Inspiron 9300 notebook computer is a prime example of all that as it is a new model, fully loaded, and is available to you at an attractive price.
Some of the top features of this particular model include:
A 17" screen – perfect for gamers and movie watchers.
Intel Pentium M Processor 730 (1.60 GHz/2MB Cache/533MHz FSB).
A whopping 1 GB of memory.
80GB hard drive.
Microsoft Windows XP Media Center Edition 2005.
8x CD/DVD burner (DVD+/-RW) with double-layer write capability.
McAfee Security Center.
3 Year Service Plan.
Depending on how you order the 9300 some of the included features may be slightly different. All models do come equipped with PCI Express graphics options for entertainment applications, including: digital video editing, digital photography, and movies. However, to watch television or view your DVDS, you must purchase the optional TV tuner for an extra $150. Another drawback is that you cannot play audio or video on the 9300 without booting up; some will find this step to be a big inconvenience. Expect future models from Dell to rectify this oversight.
The 9300 is no lightweight, weighing in at just over 9 lbs.; of course if you are moving from a desktop unit the weight will seem inconsequential.
Perhaps the best feature of the 9300 is its price. Dell is forever running specials on just about everything they sell. This particular model retails for $2209 on their site, but with an instant rebate of $750 your price begins at $1459. Even with taxes, shipping and handling charges, the tuner, and a couple of software packages thrown in you can still get the 9300 for under $2000. Comparable models from HP, Gateway, and Toshiba are likely to run several hundreds dollars more than the 9300 and Dell’s special price includes their popular three year extended warranty.
Overall, the 9300 is a nice entrant in the “full blown entertainment” category of notebook computers. With the low price and extended warranty you will find that it is a value leader as well.
Matthew Keegan is The Article Writer who writes on just about any and every issue imaginable. You can preview samples from his high performing site at http://www.thearticlewriter.com
Article Source: http://EzineArticles.com/
Tuesday, October 04, 2005
Refurbished Laptops are the Real Deal!
You will be amazed at all the ideas for refurbished computers in this article. Wow they are very usefull, even for kids--check it out! A1-Computers
Buy refurbished laptops at the Dell Outlet
Laptop computers have found usefulness as portable media devices
Refurbished laptops can be used as DVD players, stereos, and recording devices. The mobility and portability of laptops make them very useful in these categories as does the increasing capabilities of the electronics.
Many people are beginning to use their notebooks as portable DVD players
You can take these mobile devices on airplanes to pass the time as they travel. They can also use these portable notebooks in hotel rooms to provide them with entertainment. Some parents are investing in notebooks to use as entertainment for the children in the backseat with DVDs as the family makes long trips. The ability to refurbish used laptops with these portable DVD drives makes them an inexpensive way to entertain adults and children during their travels.
Computer Clearance Center
Also, these notebook computers can be used as a video phone for notebook conferencing capabilities. Traveling workers can take their portable laptop equipment to other offices as well as their homes and still connect with co-workers and clients. Mobility has become a trend with today's workforce, and notebook computers provide this mobility.
The sound capabilities of notebooks are also making them popular for use as portable music players. With MP3 music becoming more and more popular, even refurbished computers can hold and playback a large number of songs. Various notebook software programs allows for various types of audio. Audio books are also being played on notebooks for the entertainment and even education of the notebook user.
For more information on Laptop Computers visit A1-Computers
Want to read more about Electronics? Visit electronicsme.net or electronicsme.com for the latest articles on televisions, digital still cameras, and notebook computers.
Electronicsme: Where electronics are made easy!
Written by the eme team
Electronicsme.net: Where electronics are made easy! The latest articles on televisions, laptops and digital cameras.
Laptop computers have found usefulness as portable media devices
Refurbished laptops can be used as DVD players, stereos, and recording devices. The mobility and portability of laptops make them very useful in these categories as does the increasing capabilities of the electronics.
Many people are beginning to use their notebooks as portable DVD players
You can take these mobile devices on airplanes to pass the time as they travel. They can also use these portable notebooks in hotel rooms to provide them with entertainment. Some parents are investing in notebooks to use as entertainment for the children in the backseat with DVDs as the family makes long trips. The ability to refurbish used laptops with these portable DVD drives makes them an inexpensive way to entertain adults and children during their travels.
Also, these notebook computers can be used as a video phone for notebook conferencing capabilities. Traveling workers can take their portable laptop equipment to other offices as well as their homes and still connect with co-workers and clients. Mobility has become a trend with today's workforce, and notebook computers provide this mobility.
The sound capabilities of notebooks are also making them popular for use as portable music players. With MP3 music becoming more and more popular, even refurbished computers can hold and playback a large number of songs. Various notebook software programs allows for various types of audio. Audio books are also being played on notebooks for the entertainment and even education of the notebook user.
For more information on Laptop Computers visit A1-Computers
Want to read more about Electronics? Visit electronicsme.net or electronicsme.com for the latest articles on televisions, digital still cameras, and notebook computers.
Electronicsme: Where electronics are made easy!
Written by the eme team
Electronicsme.net: Where electronics are made easy! The latest articles on televisions, laptops and digital cameras.
Monday, October 03, 2005
Understanding Spyware On Your Computer
Just what can spyware do when it attaches itself to your computer? Probably more than most people realise. Read on to see just what spyware can do to hurt you and how you can avoid it all together. A1-Computers
Spyware is a "malware" or malicious software that is placed on your computer without your knowledge. This can happen when you visit online web sites offering free downloads of games, when you download videos or music, or any share files, such as when you download that comic e mail from your friend. Spyware programs are piggybacked into your machine at the same time you download a file. Spyware is infecting millions of home computers today.
Spyware tracks your on line computer habits. It knows each site you visit and what you have looked up on that site. Some spyware even tracks each keystroke you make, including every bit of information you fill out on a form, such as name and address, and credit card information when you make a purchase. This has some in the online world worried that this can lead to identity theft and stealing of credit card numbers. Your computer surfing habits and personal information is then sold to businesses. The spyware business is a billion dollar industry, with lots of people getting rich selling your information without your knowledge.
Another problem with spyware is that unless you run anti spyware software often, you don't know that spyware has been installed until your computer starts to slow down. By the time your computer slows down due to spyware you could have as many as six or seven different spyware programs running in the background.
You can get rid of spyware by running any of the number of anti-spyware programs available on the market today. Run these programs often. Some suggest that after you run an anti spyware program that you re-boot your computer and run the software again to make sure there are no "ticklers". Ticklers are designed to reinstall spyware.
The best way to avoid spyware is to stay away from downloading freebies. Don't open unsolicited e-mail, delete it before you open it. When downloading any software, even legitimate software programs from the internet read the end users agreement thoroughly. Some of these agreements will state that they are installing spyware type software, and by you downloading their program you are agreeing to let them put spyware on your computer. If you know this then you have the ability to say yes, or no and protect your personal information.
For more Computer Tips go to A1-computers.net.
Get the best VIRUS Protection here.
About the Author
This article courtesy of http://www.adware-eliminator.net
Spyware is a "malware" or malicious software that is placed on your computer without your knowledge. This can happen when you visit online web sites offering free downloads of games, when you download videos or music, or any share files, such as when you download that comic e mail from your friend. Spyware programs are piggybacked into your machine at the same time you download a file. Spyware is infecting millions of home computers today.
Spyware tracks your on line computer habits. It knows each site you visit and what you have looked up on that site. Some spyware even tracks each keystroke you make, including every bit of information you fill out on a form, such as name and address, and credit card information when you make a purchase. This has some in the online world worried that this can lead to identity theft and stealing of credit card numbers. Your computer surfing habits and personal information is then sold to businesses. The spyware business is a billion dollar industry, with lots of people getting rich selling your information without your knowledge.
Another problem with spyware is that unless you run anti spyware software often, you don't know that spyware has been installed until your computer starts to slow down. By the time your computer slows down due to spyware you could have as many as six or seven different spyware programs running in the background.
You can get rid of spyware by running any of the number of anti-spyware programs available on the market today. Run these programs often. Some suggest that after you run an anti spyware program that you re-boot your computer and run the software again to make sure there are no "ticklers". Ticklers are designed to reinstall spyware.
The best way to avoid spyware is to stay away from downloading freebies. Don't open unsolicited e-mail, delete it before you open it. When downloading any software, even legitimate software programs from the internet read the end users agreement thoroughly. Some of these agreements will state that they are installing spyware type software, and by you downloading their program you are agreeing to let them put spyware on your computer. If you know this then you have the ability to say yes, or no and protect your personal information.
For more Computer Tips go to A1-computers.net.
Get the best VIRUS Protection here.
About the Author
This article courtesy of http://www.adware-eliminator.net
Saturday, October 01, 2005
A Review of HP Laser Toners
Hewlitt Packard is one of the few major manufactures to sell remanufactured laser toner cartridges along with their new ones. A1-Computers
Hewlett-Packard is, along with Brother and Samsung, one of the most readily available brands of laser toner. This is due, in part, to the fact that HP was first to release a laser toner inexpensive enough to catch the attention of the average consumer, in 1984.
Prices on laser printers were much higher back then, sometimes costing $500. But the price on laser toner refill was a lot lower - about $30 a cartridge. Today, you can buy an HP laser printer for less than $200, but the toner replacements can cost as much as $80 if bought new from the manufacturer.
You can also buy remanufactured laser toner cartridges from HP. These are cartridges that were used up by the previous user and sent back to HP to be remade and refilled. These remanufactured cartridges cost about half as much as the new ones. These are almost exactly the same quality of new, and most people can't even tell. You only really need to buy new cartridges if you are a professional businessperson who needs to create documents of completely reliable quality.
HP laser toner can range from 50 cents for an unrated third-party remanufactured cartridge, to several hundred thousand dollars for a bulk shipment of a few thousand new cartridges direct from the manufacturer. Your needs probably fall somewhere between these two extremes. One popular HP cartridge is the HP No. 56 Black Inkjet print cartridge. This well received toner refill starts at about $14 and can climb as high as $30 via PC World-approved third parties.
A popular color laser toner refill from HP is the HP 97 Tri-Color Inkjet Print cartridge, starting at $23.
You can also buy new from HP at their website.
Save on HP Ink & Toner SuppliesLearn more about Computer Accessories like printers, iPods, memory, etc at A1-Computers.net
Hewlett-Packard is, along with Brother and Samsung, one of the most readily available brands of laser toner. This is due, in part, to the fact that HP was first to release a laser toner inexpensive enough to catch the attention of the average consumer, in 1984.
Prices on laser printers were much higher back then, sometimes costing $500. But the price on laser toner refill was a lot lower - about $30 a cartridge. Today, you can buy an HP laser printer for less than $200, but the toner replacements can cost as much as $80 if bought new from the manufacturer.
You can also buy remanufactured laser toner cartridges from HP. These are cartridges that were used up by the previous user and sent back to HP to be remade and refilled. These remanufactured cartridges cost about half as much as the new ones. These are almost exactly the same quality of new, and most people can't even tell. You only really need to buy new cartridges if you are a professional businessperson who needs to create documents of completely reliable quality.
HP laser toner can range from 50 cents for an unrated third-party remanufactured cartridge, to several hundred thousand dollars for a bulk shipment of a few thousand new cartridges direct from the manufacturer. Your needs probably fall somewhere between these two extremes. One popular HP cartridge is the HP No. 56 Black Inkjet print cartridge. This well received toner refill starts at about $14 and can climb as high as $30 via PC World-approved third parties.
A popular color laser toner refill from HP is the HP 97 Tri-Color Inkjet Print cartridge, starting at $23.
You can also buy new from HP at their website.
Save on HP Ink & Toner Supplies
About the Author
Laser Toner Info provides detailed information about later toner cartridges and refills, as well as reviews of laser toner products. Laser Toner Info is the sister site of Brochure Printing Web.
Subscribe to:
Posts (Atom)